Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

New Windows 11 Build Fixes Microsoft Installer Issue Breaking Apps

New Windows 11 Build Fixes Microsoft Installer Issue Breaking Apps

Microsoft has fixed a recently confirmed Windows 11 issue in a newly released build for Windows Insiders in the Beta and Release Preview channels.

This issue would prevent apps from opening on multiple client and server Windows versions after being repaired or updated using the Windows Installer system tool (previously known as Microsoft Installer).

Systems affected by this bug include those where Windows users have installed the KB5007215 cumulative update issued during this month’s Patch Tuesday.

The fix issued today with Windows 11 Build 22000.348 (KB5007262) only for Windows Insiders is also expected to roll out to all impacted Windows 11 customers during the December 2021 Patch Tuesday.

“We fixed a known issue that might prevent apps, such as Kaspersky apps, from opening after you attempt to repair or update the apps using the Microsoft Installer (MSI),” the Windows Insider Program Team said.

Also Read: Data Minimization; Why Bigger is Not Always Better

Systems running older Windows versions waiting for a fix

While Microsoft is now providing Windows Insiders running the latest Windows 11 beta build with a fix, users of all other Windows versions impacted by this issue will have to wait for a future update.

The complete list of Windows versions impacted by this known issue includes:

  • Client: Windows 11, version 21H2; Windows 10, version 21H2; Windows 10, version 21H1; Windows 10, version 20H2; Windows 10, version 2004; Windows 10, version 1909; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise 2015 LTSB; Windows 8.1; Windows 7 SP1
  • Server: Windows Server 2022; Windows Server, version 20H2; Windows Server, version 2004; Windows Server, version 1909; Windows Server, version 1809; Windows Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2

The list of November cumulative updates that break Windows Installer’s functionality includes:

  • Windows 7: KB5007233, KB5007236
  • Windows 8.1: KB5007247, KB5007255
  • Windows 10: KB5007206, KB5007207, KB5007186, KB5007189, KB5007192 
  • Windows 11: KB5007215
  • Windows Server 2008: KB5007246, KB5007263
  • Windows Server 2008 R2: KB5007233, KB5007236
  • Windows Server 2012: KB5007245, KB5007260
  • Windows Server 2012 R2: KB5007247, KB5007255
  • Windows Server 2016: KB5007192
  • Windows Server 2019: KB5007206
  • Windows Server 2022: KB5007205

Workaround available

While not all impacted Windows versions have a fix ready, Microsoft provides a workaround for customers experiencing difficulties launching apps after deploying one of the problematic updates.

Also Read: Vulnerability Management For Cybersecurity Dummies

“To mitigate this issue, you will need to uninstall the affected app, then install the latest version of the app,” Microsoft said.

Redmond’s engineers are working to address this issue for all other Windows customers, which will be released with a future update.

Microsoft is also readying an update to address another issue impacting Windows 11 customers that can trigger blue screens of death (BSODs) on systems with Intel Smart Sound Technology (SST) audio DSP drivers.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us